{"id":409,"date":"2026-04-12T19:50:24","date_gmt":"2026-04-12T19:50:24","guid":{"rendered":"https:\/\/jdaadvisory.com\/?page_id=409"},"modified":"2026-04-16T17:19:30","modified_gmt":"2026-04-16T15:19:30","slug":"nis-2-implementation-directive","status":"publish","type":"page","link":"https:\/\/jdaadvisory.com\/pl\/nis-2-implementation-directive\/","title":{"rendered":"NIS-2 Implementation Directive"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--1\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group alignwide ext-is-logical-start ext-animate--on has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-6729bdbe wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading ext-animate--on\">NIS-2 Implementation Directive &#8211; Discover your advantage through effective NIS-2 implementation.<\/h2>\n\n\n\n<p class=\"has-text-align-left ext-animate--on\">Explore the key benefits and unique value of our comprehensive NIS-2 implementation services &#8211; NIS-2 Implementation directive.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-174606dc wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\">\n<div class=\"wp-block-cover is-style-ext-preset--image--natural-1--image-1--content-right ext-animate--on is-style-ext-preset--image--natural-1--image-1--content-right--2\" style=\"padding-top:0;padding-bottom:0;min-height:100%;aspect-ratio:unset;\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" class=\"wp-block-cover__image-background wp-image-421\" alt=\"\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8c5ef6720a3a011fcde29ddedecedf32ca349211.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8c5ef6720a3a011fcde29ddedecedf32ca349211.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8c5ef6720a3a011fcde29ddedecedf32ca349211-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8c5ef6720a3a011fcde29ddedecedf32ca349211-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8c5ef6720a3a011fcde29ddedecedf32ca349211-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8c5ef6720a3a011fcde29ddedecedf32ca349211-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-0 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div style=\"height:240px\" aria-hidden=\"true\" class=\"wp-block-spacer ext-animate--on\"><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--3\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-64fa2afa wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group ext-animate--on wp-container-content-958eb9dc has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h3 class=\"wp-block-heading ext-animate--on\">NIS-2 Implementation Directive &#8211; Comprehensive analysis of regulatory requirements.<\/h3>\n\n\n\n<p class=\"ext-animate--on\">We thoroughly assess your organization\u2019s needs to precisely tailor the implementation process and ensure full compliance with NIS-2.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--4\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-64fa2afa wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group ext-animate--on wp-container-content-958eb9dc has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h3 class=\"wp-block-heading ext-animate--on\">NIS-2 Implementation Directive &#8211; Strategic cybersecurity support.<\/h3>\n\n\n\n<p class=\"ext-animate--on\">We provide professional consulting and practical solutions that strengthen IT system protection and minimize the risk of incidents.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--5\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-64fa2afa wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group ext-animate--on wp-container-content-958eb9dc has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h4 class=\"wp-block-heading ext-animate--on\">Training and team awareness building.<\/h4>\n\n\n\n<p class=\"ext-animate--on\">We organize dedicated training sessions that help employees understand NIS-2 requirements and effectively implement security best practices.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-tertiary-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--6\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">How NIS-2 Implementation Works<\/h4>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\" style=\"margin-top:1.5rem\">A step-by-step guide to the NIS-2 implementation process, helping you understand the requirements and the effective steps to achieve compliance.<\/p>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--7\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik0xMjgsMjRBMTA0LDEwNCwwLDEsMCwyMzIsMTI4LDEwNC4xMSwxMDQuMTEsMCwwLDAsMTI4LDI0Wm0wLDE5MmE4OCw4OCwwLDEsMSw4OC04OEE4OC4xLDg4LjEsMCwwLDEsMTI4LDIxNlpNMTQwLDgwdjk2YTgsOCwwLDAsMS0xNiwwVjk1bC0xMS41Niw3LjcxYTgsOCwwLDEsMS04Ljg4LTEzLjMybDI0LTE2QTgsOCwwLDAsMSwxNDAsODBaIj48L3BhdGg+PC9zdmc+\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Step One: Analysis and Preparation<\/h4>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">Description of the initial phase, including assessment of the current security posture and planning the actions necessary to meet NIS-2 requirements.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--8\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik0xMjgsMjRBMTA0LDEwNCwwLDEsMCwyMzIsMTI4LDEwNC4xMSwxMDQuMTEsMCwwLDAsMTI4LDI0Wm0wLDE5MmE4OCw4OCwwLDEsMSw4OC04OEE4OC4xLDg4LjEsMCwwLDEsMTI4LDIxNlptMjUuNTYtOTIuNzRMMTIwLDE2OGgzMmE4LDgsMCwwLDEsMCwxNkgxMDRhOCw4LDAsMCwxLTYuNC0xMi44bDQzLjE3LTU3LjU2YTE2LDE2LDAsMSwwLTI3Ljg2LTE1LDgsOCwwLDAsMS0xNS4wOS01LjM0LDMyLDMyLDAsMSwxLDU1Ljc0LDI5LjkzWiI+PC9wYXRoPjwvc3ZnPg==\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Step Two: Implementation of Measures<\/h4>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">Detailed description of the stage involving the introduction of new solutions and procedures that ensure effective system protection in line with NIS-2.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--9\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Step Three: Monitoring and Support<\/h4>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">Overview of continuous supervision and support methods that ensure ongoing compliance and protection against cyber threats.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--10\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group alignwide ext-is-logical-start ext-animate--on has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-6729bdbe wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading ext-animate--on\">Explore the key elements of NIS-2 implementation.<\/h4>\n\n\n\n<p class=\"has-text-align-left ext-animate--on\">This section presents the most important aspects of the NIS-2 regulation, explaining how it supports digital security and the benefits of its implementation.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-87beb0d0 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\">\n<div class=\"wp-block-media-text is-stacked-on-mobile is-image-fill-element is-style-ext-preset--media-text--natural-1--card-1 ext-animate--on has-tertiary-background-color has-background is-style-ext-preset--media-text--natural-1--card-1--11\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/7a4dd1fecb55d039c86c680ea6c3aaa98713b99f.jpg\" alt=\"\" class=\"wp-image-422 size-full\" style=\"object-position:50% 50%\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/7a4dd1fecb55d039c86c680ea6c3aaa98713b99f.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/7a4dd1fecb55d039c86c680ea6c3aaa98713b99f-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/7a4dd1fecb55d039c86c680ea6c3aaa98713b99f-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/7a4dd1fecb55d039c86c680ea6c3aaa98713b99f-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/7a4dd1fecb55d039c86c680ea6c3aaa98713b99f-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-9a7b35d3 wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--30)\">\n<h4 class=\"wp-block-heading ext-animate--on\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.86), 24px);\">Risk Analysis and Compliance Assessment<\/h4>\n\n\n\n<p class=\"ext-animate--on has-small-font-size\">We conduct a detailed risk analysis to align actions with NIS-2 requirements.<\/p>\n<\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\">\n<div class=\"wp-block-media-text is-stacked-on-mobile is-image-fill-element is-style-ext-preset--media-text--natural-1--card-1 ext-animate--on has-tertiary-background-color has-background is-style-ext-preset--media-text--natural-1--card-1--12\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/24b86d7078c7ee002d9051694efe160aafd4a750.jpg\" alt=\"\" class=\"wp-image-423 size-full\" style=\"object-position:50% 50%\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/24b86d7078c7ee002d9051694efe160aafd4a750.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/24b86d7078c7ee002d9051694efe160aafd4a750-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/24b86d7078c7ee002d9051694efe160aafd4a750-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/24b86d7078c7ee002d9051694efe160aafd4a750-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/24b86d7078c7ee002d9051694efe160aafd4a750-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-9a7b35d3 wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--30)\">\n<h4 class=\"wp-block-heading ext-animate--on\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.86), 24px);\">Support in Developing Security Policies<\/h4>\n\n\n\n<p class=\"ext-animate--on has-small-font-size\">We assist in developing effective policies compliant with NIS-2 regulations.<\/p>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-e12f0bcd wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-column ext-animate--on is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\">\n<div class=\"wp-block-media-text is-stacked-on-mobile is-image-fill-element is-style-ext-preset--media-text--natural-1--card-1 ext-animate--on has-tertiary-background-color has-background is-style-ext-preset--media-text--natural-1--card-1--13\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8322fad14c251450552fe8a9de9cffdd6c9a2709.jpg\" alt=\"\" class=\"wp-image-424 size-full\" style=\"object-position:50% 50%\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8322fad14c251450552fe8a9de9cffdd6c9a2709.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8322fad14c251450552fe8a9de9cffdd6c9a2709-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8322fad14c251450552fe8a9de9cffdd6c9a2709-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8322fad14c251450552fe8a9de9cffdd6c9a2709-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8322fad14c251450552fe8a9de9cffdd6c9a2709-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-9a7b35d3 wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--30)\">\n<h4 class=\"wp-block-heading ext-animate--on\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.86), 24px);\">Training and Awareness Raising<\/h4>\n\n\n\n<p class=\"ext-animate--on has-small-font-size\">We organize training sessions to enhance the team\u2019s knowledge of security requirements.<\/p>\n<\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column ext-animate--on is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\">\n<div class=\"wp-block-media-text is-stacked-on-mobile is-image-fill-element is-style-ext-preset--media-text--natural-1--card-1 ext-animate--on has-tertiary-background-color has-background is-style-ext-preset--media-text--natural-1--card-1--14\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/3cf5be64ef9ec35f294b506946ef5a04ddf80ef3.jpg\" alt=\"\" class=\"wp-image-425 size-full\" style=\"object-position:50% 50%\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/3cf5be64ef9ec35f294b506946ef5a04ddf80ef3.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/3cf5be64ef9ec35f294b506946ef5a04ddf80ef3-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/3cf5be64ef9ec35f294b506946ef5a04ddf80ef3-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/3cf5be64ef9ec35f294b506946ef5a04ddf80ef3-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/3cf5be64ef9ec35f294b506946ef5a04ddf80ef3-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-9a7b35d3 wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--30)\">\n<h4 class=\"wp-block-heading ext-animate--on\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.86), 24px);\">Incident Monitoring and Reporting<\/h4>\n\n\n\n<p class=\"ext-animate--on has-small-font-size\">We provide tools for effective detection and reporting of cyber threats.<\/p>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-tertiary-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--15\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group alignwide ext-is-logical-start ext-animate--on has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-20186816 wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading ext-animate--on\">Client Testimonials and References<\/h4>\n\n\n\n<p class=\"ext-animate--on\">We present authentic client testimonials highlighting the effectiveness and professionalism of our solutions.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--16\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"ext-animate--on\" style=\"margin-top:var(--wp--preset--spacing--30);margin-bottom:24px;font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.417), 18px);\">\u201cCooperation with the JDA Advisory team was crucial for the smooth implementation of NIS-2 in our company.\u201d<\/p>\n\n\n\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-e504371c wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-fe9d9fd4 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image aligncenter is-style-rounded ext-animate--on\"><img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/c972b533584bb5f528690a71c4e98cb9d6ac3c0c.jpg\" alt=\"\" class=\"wp-image-52\" style=\"object-fit:cover\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-639b5052 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h4 class=\"wp-block-heading ext-animate--on has-small-font-size\" style=\"font-style:normal;font-weight:600\">Anna Kowalska<\/h4>\n\n\n\n<p class=\"ext-animate--on has-small-font-size\" style=\"margin-top:4px;margin-bottom:0\">IT Security Director<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--17\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"ext-animate--on\" style=\"margin-top:var(--wp--preset--spacing--30);margin-bottom:24px;font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.417), 18px);\">\u201cJDA Advisory demonstrated full professionalism and reliability, ensuring our complete regulatory compliance.\u201d<\/p>\n\n\n\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-e504371c wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-8d3fcc49 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image aligncenter size-large is-style-rounded ext-animate--on\"><img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/afdab9369b3f7f0d7d33df0b3b3b5904f03ce6dc.jpg\" alt=\"\" class=\"wp-image-68\" style=\"object-fit:cover\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-639b5052 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h4 class=\"wp-block-heading ext-animate--on has-small-font-size\" style=\"font-style:normal;font-weight:600\">Marcin Nowak<\/h4>\n\n\n\n<p class=\"ext-animate--on has-small-font-size\" style=\"margin-top:4px;margin-bottom:0\">Cybersecurity Project Manager<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--18\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMTE2IiBoZWlnaHQ9IjE5IiB2aWV3Qm94PSIwIDAgMTE2IDE5IiBmaWxsPSJub25lIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPgo8ZyBjbGlwLXBhdGg9InVybCgjY2xpcDBfMzAyXzE5MTQpIj4KPHBhdGggZD0iTTkuMDcwODggMC42MTIzNDNDOS40MTQ2MiAtMC4yMDQxMTUgMTAuNTg1NCAtMC4yMDQxMTQgMTAuOTI5MSAwLjYxMjM0NkwxMi45NTc5IDUuNDMxMjNDMTMuMTAyOSA1Ljc3NTQzIDEzLjQzMDYgNi4wMTA2MSAxMy44MDY3IDYuMDQwNEwxOS4wNzI3IDYuNDU3NDhDMTkuOTY0OSA2LjUyODE0IDIwLjMyNjcgNy42MjgxMyAxOS42NDY5IDguMjAzNEwxNS42MzQ4IDExLjU5ODdDMTUuMzQ4MiAxMS44NDEyIDE1LjIyMyAxMi4yMjE4IDE1LjMxMDYgMTIuNTg0M0wxNi41MzYzIDE3LjY2MUMxNi43NDQgMTguNTIxMSAxNS43OTY5IDE5LjIwMSAxNS4wMzMgMTguNzQwMUwxMC41MjQ1IDE2LjAxOTZDMTAuMjAyNSAxNS44MjUyIDkuNzk3NSAxNS44MjUyIDkuNDc1NDggMTYuMDE5Nkw0Ljk2Njk5IDE4Ljc0MDFDNC4yMDMxMSAxOS4yMDEgMy4yNTU5NiAxOC41MjExIDMuNDYzNjMgMTcuNjYxTDQuNjg5NDIgMTIuNTg0M0M0Ljc3Njk4IDEyLjIyMTggNC42NTE4MiAxMS44NDEyIDQuMzY1MjYgMTEuNTk4N0wwLjM1MzA2MiA4LjIwMzRDLTAuMzI2NzE4IDcuNjI4MTMgMC4wMzUwNjc5IDYuNTI4MTQgMC45MjcyOTEgNi40NTc0OEw2LjE5MzM2IDYuMDQwNEM2LjU2OTUgNi4wMTA2MSA2Ljg5NzE2IDUuNzc1NDMgNy4wNDIwNyA1LjQzMTIzTDkuMDcwODggMC42MTIzNDNaIiBmaWxsPSIjMjIyMjIyIi8+CjxwYXRoIGQ9Ik0zMy4wNzA5IDAuNjEyMzQzQzMzLjQxNDYgLTAuMjA0MTE1IDM0LjU4NTQgLTAuMjA0MTE0IDM0LjkyOTEgMC42MTIzNDZMMzYuOTU3OSA1LjQzMTIzQzM3LjEwMjkgNS43NzU0MyAzNy40MzA2IDYuMDEwNjEgMzcuODA2NyA2LjA0MDRMNDMuMDcyNyA2LjQ1NzQ4QzQzLjk2NDkgNi41MjgxNCA0NC4zMjY3IDcuNjI4MTMgNDMuNjQ2OSA4LjIwMzRMMzkuNjM0OCAxMS41OTg3QzM5LjM0ODIgMTEuODQxMiAzOS4yMjMgMTIuMjIxOCAzOS4zMTA2IDEyLjU4NDNMNDAuNTM2MyAxNy42NjFDNDAuNzQ0IDE4LjUyMTEgMzkuNzk2OSAxOS4yMDEgMzkuMDMzIDE4Ljc0MDFMMzQuNTI0NSAxNi4wMTk2QzM0LjIwMjUgMTUuODI1MiAzMy43OTc1IDE1LjgyNTIgMzMuNDc1NSAxNi4wMTk2TDI4Ljk2NyAxOC43NDAxQzI4LjIwMzEgMTkuMjAxIDI3LjI1NiAxOC41MjExIDI3LjQ2MzYgMTcuNjYxTDI4LjY4OTQgMTIuNTg0M0MyOC43NzcgMTIuMjIxOCAyOC42NTE4IDExLjg0MTIgMjguMzY1MyAxMS41OTg3TDI0LjM1MzEgOC4yMDM0QzIzLjY3MzMgNy42MjgxMyAyNC4wMzUxIDYuNTI4MTQgMjQuOTI3MyA2LjQ1NzQ4TDMwLjE5MzQgNi4wNDA0QzMwLjU2OTUgNi4wMTA2MSAzMC44OTcyIDUuNzc1NDMgMzEuMDQyMSA1LjQzMTIzTDMzLjA3MDkgMC42MTIzNDNaIiBmaWxsPSIjMjIyMjIyIi8+CjxwYXRoIGQ9Ik01Ny4wNzA5IDAuNjEyMzQzQzU3LjQxNDYgLTAuMjA0MTE1IDU4LjU4NTQgLTAuMjA0MTE0IDU4LjkyOTEgMC42MTIzNDZMNjAuOTU3OSA1LjQzMTIzQzYxLjEwMjkgNS43NzU0MyA2MS40MzA2IDYuMDEwNjEgNjEuODA2NyA2LjA0MDRMNjcuMDcyNyA2LjQ1NzQ4QzY3Ljk2NDkgNi41MjgxNCA2OC4zMjY3IDcuNjI4MTMgNjcuNjQ2OSA4LjIwMzRMNjMuNjM0OCAxMS41OTg3QzYzLjM0ODIgMTEuODQxMiA2My4yMjMgMTIuMjIxOCA2My4zMTA2IDEyLjU4NDNMNjQuNTM2MyAxNy42NjFDNjQuNzQ0IDE4LjUyMTEgNjMuNzk2OSAxOS4yMDEgNjMuMDMzIDE4Ljc0MDFMNTguNTI0NSAxNi4wMTk2QzU4LjIwMjUgMTUuODI1MiA1Ny43OTc1IDE1LjgyNTIgNTcuNDc1NSAxNi4wMTk2TDUyLjk2NyAxOC43NDAxQzUyLjIwMzEgMTkuMjAxIDUxLjI1NiAxOC41MjExIDUxLjQ2MzYgMTcuNjYxTDUyLjY4OTQgMTIuNTg0M0M1Mi43NzcgMTIuMjIxOCA1Mi42NTE4IDExLjg0MTIgNTIuMzY1MyAxMS41OTg3TDQ4LjM1MzEgOC4yMDM0QzQ3LjY3MzMgNy42MjgxMyA0OC4wMzUxIDYuNTI4MTQgNDguOTI3MyA2LjQ1NzQ4TDU0LjE5MzQgNi4wNDA0QzU0LjU2OTUgNi4wMTA2MSA1NC44OTcyIDUuNzc1NDMgNTUuMDQyMSA1LjQzMTIzTDU3LjA3MDkgMC42MTIzNDNaIiBmaWxsPSIjMjIyMjIyIi8+CjxwYXRoIGQ9Ik04MS4wNzA2IDAuNjEyMzQzQzgxLjQxNDQgLTAuMjA0MTE1IDgyLjU4NTEgLTAuMjA0MTE0IDgyLjkyODkgMC42MTIzNDZMODQuOTU3NiA1LjQzMTIzQzg1LjEwMjYgNS43NzU0MyA4NS40MzAzIDYuMDEwNjEgODUuODA2NCA2LjA0MDRMOTEuMDcyNCA2LjQ1NzQ4QzkxLjk2NDYgNi41MjgxNCA5Mi4zMjY0IDcuNjI4MTMgOTEuNjQ2NiA4LjIwMzRMODcuNjM0NSAxMS41OTg3Qzg3LjM0OCAxMS44NDEyIDg3LjIyMjggMTIuMjIxOCA4Ny4zMTAzIDEyLjU4NDNMODguNTM2MSAxNy42NjFDODguNzQzOCAxOC41MjExIDg3Ljc5NjYgMTkuMjAxIDg3LjAzMjggMTguNzQwMUw4Mi41MjQzIDE2LjAxOTZDODIuMjAyMyAxNS44MjUyIDgxLjc5NzMgMTUuODI1MiA4MS40NzUyIDE2LjAxOTZMNzYuOTY2NyAxOC43NDAxQzc2LjIwMjkgMTkuMjAxIDc1LjI1NTcgMTguNTIxMSA3NS40NjM0IDE3LjY2MUw3Ni42ODkyIDEyLjU4NDNDNzYuNzc2NyAxMi4yMjE4IDc2LjY1MTYgMTEuODQxMiA3Ni4zNjUgMTEuNTk4N0w3Mi4zNTI4IDguMjAzNEM3MS42NzMgNy42MjgxMyA3Mi4wMzQ4IDYuNTI4MTQgNzIuOTI3IDYuNDU3NDhMNzguMTkzMSA2LjA0MDRDNzguNTY5MyA2LjAxMDYxIDc4Ljg5NjkgNS43NzU0MyA3OS4wNDE4IDUuNDMxMjNMODEuMDcwNiAwLjYxMjM0M1oiIGZpbGw9IiMyMjIyMjIiLz4KPHBhdGggZD0iTTEwNS4wNzEgMC42MTIzNDNDMTA1LjQxNCAtMC4yMDQxMTUgMTA2LjU4NSAtMC4yMDQxMTQgMTA2LjkyOSAwLjYxMjM0NkwxMDguOTU4IDUuNDMxMjNDMTA5LjEwMyA1Ljc3NTQzIDEwOS40MyA2LjAxMDYxIDEwOS44MDYgNi4wNDA0TDExNS4wNzIgNi40NTc0OEMxMTUuOTY1IDYuNTI4MTQgMTE2LjMyNiA3LjYyODEzIDExNS42NDcgOC4yMDM0TDExMS42MzUgMTEuNTk4N0MxMTEuMzQ4IDExLjg0MTIgMTExLjIyMyAxMi4yMjE4IDExMS4zMSAxMi41ODQzTDExMi41MzYgMTcuNjYxQzExMi43NDQgMTguNTIxMSAxMTEuNzk3IDE5LjIwMSAxMTEuMDMzIDE4Ljc0MDFMMTA2LjUyNCAxNi4wMTk2QzEwNi4yMDIgMTUuODI1MiAxMDUuNzk3IDE1LjgyNTIgMTA1LjQ3NSAxNi4wMTk2TDEwMC45NjcgMTguNzQwMUMxMDAuMjAzIDE5LjIwMSA5OS4yNTU3IDE4LjUyMTEgOTkuNDYzNCAxNy42NjFMMTAwLjY4OSAxMi41ODQzQzEwMC43NzcgMTIuMjIxOCAxMDAuNjUyIDExLjg0MTIgMTAwLjM2NSAxMS41OTg3TDk2LjM1MjggOC4yMDM0Qzk1LjY3MyA3LjYyODEzIDk2LjAzNDggNi41MjgxNCA5Ni45MjcgNi40NTc0OEwxMDIuMTkzIDYuMDQwNEMxMDIuNTY5IDYuMDEwNjEgMTAyLjg5NyA1Ljc3NTQzIDEwMy4wNDIgNS40MzEyM0wxMDUuMDcxIDAuNjEyMzQzWiIgZmlsbD0iIzIyMjIyMiIvPgo8L2c+CjxkZWZzPgo8Y2xpcFBhdGggaWQ9ImNsaXAwXzMwMl8xOTE0Ij4KPHJlY3Qgd2lkdGg9IjExNiIgaGVpZ2h0PSIxOC44ODg5IiBmaWxsPSJ3aGl0ZSIvPgo8L2NsaXBQYXRoPgo8L2RlZnM+Cjwvc3ZnPgo=\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"ext-animate--on\" style=\"margin-top:var(--wp--preset--spacing--30);margin-bottom:24px;font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.417), 18px);\">\u201cThanks to JDA Advisory\u2019s support, the NIS-2 implementation process ran smoothly and without unnecessary complications.\u201d<\/p>\n\n\n\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-e504371c wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-8d3fcc49 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image aligncenter size-large is-style-rounded ext-animate--on\"><img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/9e863a71525f4c4b9064e7f990b6010a766cbe26.jpg\" alt=\"\" class=\"wp-image-69\" style=\"object-fit:cover\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-639b5052 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h4 class=\"wp-block-heading ext-animate--on has-small-font-size\" style=\"font-style:normal;font-weight:600\">Ewa Wi\u015bniewska<\/h4>\n\n\n\n<p class=\"ext-animate--on has-small-font-size\" style=\"margin-top:4px;margin-bottom:0\">Compliance Specialist<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\">NIS-2 Act<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--19\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile is-image-fill-element is-style-ext-preset--media-text--natural-1--card-1 ext-animate--on has-tertiary-background-color has-background is-style-ext-preset--media-text--natural-1--card-1--20\"><div class=\"wp-block-media-text__content\">\n<div class=\"wp-block-group alignwide ext-animate--on is-vertical is-layout-flex wp-container-core-group-is-layout-53474e87 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"wp-block-group ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-812d5580 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h4 class=\"wp-block-heading ext-animate--on\">Start your NIS-2 implementation with us today.<\/h4>\n\n\n\n<p class=\"ext-animate--on\">We invite you to explore the details of NIS-2 implementation and benefit from JDA Advisory\u2019s professional support, helping your company meet cybersecurity requirements.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-ext-preset--button--natural-1--button-1 ext-animate--on is-style-ext-preset--button--natural-1--button-1--21\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/jdaadvisory.com\/en\/contact\/\">Learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/602775a347cbc39988a2086412a382a371cc6861.jpg\" alt=\"\" class=\"wp-image-426 size-full\" style=\"object-position:50% 50%\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/602775a347cbc39988a2086412a382a371cc6861.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/602775a347cbc39988a2086412a382a371cc6861-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/602775a347cbc39988a2086412a382a371cc6861-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/602775a347cbc39988a2086412a382a371cc6861-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/602775a347cbc39988a2086412a382a371cc6861-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure><\/div>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\">Complete, consulting\u2011grade methodology for implementing NIS\u20112, aligned with&nbsp;Directive (EU) 2022\/2555, the&nbsp;expected Implementing Acts, and the&nbsp;12 NIS\u20112 risk\u2011management domains.<\/h4>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>NIS\u20112 Implementation Methodology (End\u2011to\u2011End)<\/strong><\/h4>\n\n\n\n<p class=\"ext-animate--on\"><strong>Aligned with Articles 20\u201323 and Annex I &amp; II of NIS\u20112<\/strong><\/p>\n\n\n\n<p class=\"ext-animate--on\">Implementation follows <strong>six major phases<\/strong>, each with clear deliverables and milestones.<\/p>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>PHASE 1 \u2014 Initiation &amp; Governance Setup<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objectives<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Establish governance for NIS\u20112 implementation.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Define scope, entity classification, and regulatory obligations.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Identify critical services, assets, and dependencies.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Key Activities<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Appoint NIS\u20112 Programme Lead and Steering Committee.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Determine entity type (Essential vs Important).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Define scope (services, ICT\/OT systems, locations).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Identify internal\/external stakeholders.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Approve project plan and communication plan.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Deliverables<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">NIS\u20112 Programme Charter<\/li>\n\n\n\n<li class=\"ext-animate--on\">Governance &amp; RACI Matrix<\/li>\n\n\n\n<li class=\"ext-animate--on\">Scope Statement<\/li>\n\n\n\n<li class=\"ext-animate--on\">Stakeholder Register<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Milestone<\/strong><\/h5>\n\n\n\n<p class=\"ext-animate--on\"><strong>M1: NIS\u20112 implementation formally launched<\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>PHASE 2 \u2014 Gap Assessment &amp; Regulatory Mapping<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objectives<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Assess current maturity vs NIS\u20112 Articles and 12 security domains.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Identify gaps in governance, risk management, incident handling, and supply chain security.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Key Activities<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Perform NIS\u20112 gap analysis across:\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Governance &amp; accountability<\/li>\n\n\n\n<li class=\"ext-animate--on\">Risk management<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident handling<\/li>\n\n\n\n<li class=\"ext-animate--on\">Business continuity<\/li>\n\n\n\n<li class=\"ext-animate--on\">Supply chain security<\/li>\n\n\n\n<li class=\"ext-animate--on\">ICT\/OT security controls<\/li>\n\n\n\n<li class=\"ext-animate--on\">Logging &amp; monitoring<\/li>\n\n\n\n<li class=\"ext-animate--on\">Cryptography &amp; data protection<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li class=\"ext-animate--on\">Map existing controls to NIS\u20112 requirements.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Identify sector\u2011specific obligations (energy, finance, digital services, etc.).<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Deliverables<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Gap Assessment Report<\/li>\n\n\n\n<li class=\"ext-animate--on\">Regulatory Mapping Matrix<\/li>\n\n\n\n<li class=\"ext-animate--on\">Prioritised Remediation Roadmap<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Milestone<\/strong><\/h5>\n\n\n\n<p class=\"ext-animate--on\"><strong>M2: Gap analysis completed and roadmap approved<\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>PHASE 3 \u2014 Risk Management Framework &amp; Core Controls<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objectives<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Build or enhance the NIS\u20112\u2011aligned risk management framework.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Implement mandatory policies, processes, and governance.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Key Activities<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Develop\/upgrade:\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Cybersecurity Policy<\/li>\n\n\n\n<li class=\"ext-animate--on\">Risk Management Methodology<\/li>\n\n\n\n<li class=\"ext-animate--on\">Asset Inventory (IT\/OT)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Change Management<\/li>\n\n\n\n<li class=\"ext-animate--on\">Access Control &amp; Identity Management<\/li>\n\n\n\n<li class=\"ext-animate--on\">Logging &amp; Monitoring Framework<\/li>\n\n\n\n<li class=\"ext-animate--on\">Network &amp; System Security Controls<\/li>\n\n\n\n<li class=\"ext-animate--on\">Cryptography &amp; Data Protection<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li class=\"ext-animate--on\">Define KPIs, KRIs, and reporting dashboards.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Deliverables<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Cybersecurity Risk Management Framework<\/li>\n\n\n\n<li class=\"ext-animate--on\">Asset Inventory<\/li>\n\n\n\n<li class=\"ext-animate--on\">Updated Policies &amp; Procedures<\/li>\n\n\n\n<li class=\"ext-animate--on\">Risk Assessment Methodology<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Milestone<\/strong><\/h5>\n\n\n\n<p class=\"ext-animate--on\"><strong>M3: Core NIS\u20112 risk management framework implemented<\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>PHASE 4 \u2014 Incident Management &amp; Reporting<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objectives<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Implement NIS\u20112\u2011compliant incident classification and reporting.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Ensure readiness for:\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\"><strong>24h early warning<\/strong><\/li>\n\n\n\n<li class=\"ext-animate--on\"><strong>72h incident notification<\/strong><\/li>\n\n\n\n<li class=\"ext-animate--on\"><strong>1\u2011month final report<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Key Activities<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Implement:\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Incident Management Policy<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident classification (significant vs non\u2011significant)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident register<\/li>\n\n\n\n<li class=\"ext-animate--on\">Reporting templates<\/li>\n\n\n\n<li class=\"ext-animate--on\">Escalation matrix<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li class=\"ext-animate--on\">Conduct incident response exercises.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Deliverables<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Incident Management Procedure<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident Classification Matrix<\/li>\n\n\n\n<li class=\"ext-animate--on\">Reporting Templates<\/li>\n\n\n\n<li class=\"ext-animate--on\">Exercise Reports<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Milestone<\/strong><\/h5>\n\n\n\n<p class=\"ext-animate--on\"><strong>M4: Incident management &amp; reporting fully operational<\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>PHASE 5 \u2014 Business Continuity, Crisis Management &amp; Supply Chain Security<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objectives<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Implement continuity and resilience controls required by NIS\u20112.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Strengthen supply chain cybersecurity.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Key Activities<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Develop or update:\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Business Continuity Plans (BCP)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Disaster Recovery Plans (DRP)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Crisis Management Plan<\/li>\n\n\n\n<li class=\"ext-animate--on\">Supplier risk assessment process<\/li>\n\n\n\n<li class=\"ext-animate--on\">Contractual security requirements<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li class=\"ext-animate--on\">Conduct continuity and crisis exercises.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Deliverables<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">BCP &amp; DRP<\/li>\n\n\n\n<li class=\"ext-animate--on\">Crisis Management Plan<\/li>\n\n\n\n<li class=\"ext-animate--on\">Supplier Risk Assessment Framework<\/li>\n\n\n\n<li class=\"ext-animate--on\">Updated Contract Templates<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Milestone<\/strong><\/h5>\n\n\n\n<p class=\"ext-animate--on\"><strong>M5: Continuity, crisis management &amp; supply chain controls implemented<\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>PHASE 6 \u2014 Monitoring, Audit, Training &amp; Supervisory Readiness<\/strong><\/h4>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objectives<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Ensure organisation is fully compliant and audit\u2011ready.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Train staff and management.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Key Activities<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Implement monitoring and measurement.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Conduct internal NIS\u20112 audit.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Conduct management review.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Prepare evidence package for supervisory authorities.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Deliver training for:\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">ICT teams<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident responders<\/li>\n\n\n\n<li class=\"ext-animate--on\">Management<\/li>\n\n\n\n<li class=\"ext-animate--on\">Procurement<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Deliverables<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Internal Audit Report<\/li>\n\n\n\n<li class=\"ext-animate--on\">Management Review Minutes<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence Package<\/li>\n\n\n\n<li class=\"ext-animate--on\">Training Records<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Milestone<\/strong><\/h5>\n\n\n\n<p class=\"ext-animate--on\"><strong>M6: NIS\u20112 compliance achieved<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\"><strong>Typical NIS\u20112 Implementation Schedule (4\u20138 Months)<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table ext-animate--on\"><table class=\"has-fixed-layout\"><thead><tr><th>Month<\/th><th>Phase<\/th><th>Key&nbsp;Milestones<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>Phase&nbsp;1<\/td><td>Governance&nbsp;&amp;&nbsp;scope&nbsp;defined<\/td><\/tr><tr><td>1\u20132<\/td><td>Phase&nbsp;2<\/td><td>Gap&nbsp;analysis&nbsp;+&nbsp;roadmap<\/td><\/tr><tr><td>2\u20134<\/td><td>Phase&nbsp;3<\/td><td>Risk&nbsp;management&nbsp;framework<\/td><\/tr><tr><td>3\u20135<\/td><td>Phase&nbsp;4<\/td><td>Incident&nbsp;management&nbsp;&amp;&nbsp;reporting<\/td><\/tr><tr><td>4\u20136<\/td><td>Phase&nbsp;5<\/td><td>Continuity&nbsp;&amp;&nbsp;supply&nbsp;chain&nbsp;controls<\/td><\/tr><tr><td>6\u20138<\/td><td>Phase&nbsp;6<\/td><td>Audit,&nbsp;training,&nbsp;supervisory&nbsp;readiness<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"ext-animate--on\">Small entities: <strong>3\u20134 months<\/strong> Mid\u2011sized entities: <strong>4\u20138 months<\/strong> Large\/complex entities: <strong>8\u201314 months<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\"><strong>NIS\u20112 Implementation Checklist (Comprehensive)<\/strong><\/h3>\n\n\n\n<p class=\"ext-animate--on\">Aligned with <strong>Article 21 (Risk Management Measures)<\/strong> and <strong>Article 23 (Incident Reporting)<\/strong>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>1. Governance &amp; Accountability<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">[ ] Cybersecurity governance structure defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Roles and responsibilities documented<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Management oversight documented<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Policies reviewed annually<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>2. Cybersecurity Policies &amp; Procedures<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">[ ] Information security policy<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Acceptable use policy<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Change management procedure<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Secure development practices<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] OT\/ICS security policies (if applicable)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>3. Risk Management<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">[ ] Risk management methodology defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Risk assessment performed<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Risk register maintained<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Mitigation measures implemented<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>4. Incident Handling<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">[ ] Incident response plan documented<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Incident classification defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Incident register maintained<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] 24h early warning capability<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] 72h notification capability<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Final report capability<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Post\u2011incident reviews performed<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>5. Business Continuity &amp; Disaster Recovery<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">[ ] BCP and DRP documented<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] RTO\/RPO defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Backup policy implemented<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Restore tests performed<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Crisis communication plan exists<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>6. Supply Chain Security<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">[ ] Supplier inventory maintained<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Supplier risk assessments performed<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Security requirements included in contracts<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Sub\u2011outsourcing controls defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Monitoring of critical suppliers performed<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>7. Network &amp; Information System Security<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">[ ] Network segmentation implemented<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Firewalls and filtering in place<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Secure configuration baselines defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] OT\/ICS network separation (if applicable)<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Remote access secured<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>8. Access Control &amp; Identity Management<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">[ ] MFA enforced<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Least privilege principle applied<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Joiner\/mover\/leaver process implemented<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Privileged access management in place<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Periodic access reviews performed<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>9. Cryptography &amp; Data Protection<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">[ ] Encryption in transit<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Encryption at rest<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Key management procedures defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Data classification implemented<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] GDPR alignment verified<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>10. Vulnerability &amp; Patch Management<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">[ ] Vulnerability scanning performed<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Patch management process defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Critical patches applied within SLA<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Asset inventory maintained<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Secure configuration monitoring in place<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>11. Monitoring, Logging &amp; Detection<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">[ ] Logging policy defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] SIEM or log aggregation in place<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Log retention meets regulatory requirements<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Alerting and monitoring procedures defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Detection capabilities tested<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>12. Human Resources Security<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">[ ] Security awareness training conducted<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Role\u2011based training for privileged users<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Background checks performed (where appropriate)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>13. Physical Security<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">[ ] Access to critical areas controlled<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] CCTV or monitoring in place<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Visitor logs maintained<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Environmental controls implemented<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>14. Documentation &amp; Evidence<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">[ ] Supervisory reporting prepared<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Policies and procedures documented<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Evidence of control operation retained<\/li>\n\n\n\n<li class=\"ext-animate--on\">[ ] Audit trails maintained<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>NIS-2 Implementation Directive &#8211; Discover your advantage through effective NIS-2 implementation. Explore the key benefits and unique value of our comprehensive NIS-2 implementation services &#8211; NIS-2 Implementation directive. NIS-2 Implementation Directive &#8211; Comprehensive analysis of regulatory requirements. We thoroughly assess your organization\u2019s needs to precisely tailor the implementation process and ensure full compliance with NIS-2. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-with-title","meta":{"footnotes":""},"class_list":["post-409","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIS-2 Implementation Directive - JDA Advisory<\/title>\n<meta name=\"description\" content=\"NIS-2 Implementation Directive. Implementation requirements analysis, gap assessment, policies, incidents, BCP\/DRP, vendors, and governance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jdaadvisory.com\/pl\/nis-2-implementation-directive\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS-2 Implementation Directive - JDA Advisory\" \/>\n<meta property=\"og:description\" content=\"NIS-2 Implementation Directive. Implementation requirements analysis, gap assessment, policies, incidents, BCP\/DRP, vendors, and governance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jdaadvisory.com\/pl\/nis-2-implementation-directive\/\" \/>\n<meta property=\"og:site_name\" content=\"JDA Advisory\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-16T15:19:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8c5ef6720a3a011fcde29ddedecedf32ca349211.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@AdvisoryJd65783\" \/>\n<meta name=\"twitter:label1\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-implementation-directive\\\/\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-implementation-directive\\\/\",\"name\":\"NIS-2 Implementation Directive - JDA Advisory\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-implementation-directive\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-implementation-directive\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/8c5ef6720a3a011fcde29ddedecedf32ca349211.jpg\",\"datePublished\":\"2026-04-12T19:50:24+00:00\",\"dateModified\":\"2026-04-16T15:19:30+00:00\",\"description\":\"NIS-2 Implementation Directive. Implementation requirements analysis, gap assessment, policies, incidents, BCP\\\/DRP, vendors, and governance.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-implementation-directive\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-implementation-directive\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-implementation-directive\\\/#primaryimage\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/8c5ef6720a3a011fcde29ddedecedf32ca349211.jpg\",\"contentUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/8c5ef6720a3a011fcde29ddedecedf32ca349211.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-implementation-directive\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/jdaadvisory.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS-2 Implementation Directive\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/\",\"name\":\"JDA Advisory\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#organization\",\"name\":\"JDA Advisory\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg\",\"contentUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg\",\"width\":1024,\"height\":1024,\"caption\":\"JDA Advisory\"},\"image\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/AdvisoryJd65783\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS-2 Implementation Directive - JDA Advisory","description":"NIS-2 Implementation Directive. Implementation requirements analysis, gap assessment, policies, incidents, BCP\/DRP, vendors, and governance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jdaadvisory.com\/pl\/nis-2-implementation-directive\/","og_locale":"pl_PL","og_type":"article","og_title":"NIS-2 Implementation Directive - JDA Advisory","og_description":"NIS-2 Implementation Directive. Implementation requirements analysis, gap assessment, policies, incidents, BCP\/DRP, vendors, and governance.","og_url":"https:\/\/jdaadvisory.com\/pl\/nis-2-implementation-directive\/","og_site_name":"JDA Advisory","article_modified_time":"2026-04-16T15:19:30+00:00","og_image":[{"width":1440,"height":960,"url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8c5ef6720a3a011fcde29ddedecedf32ca349211.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@AdvisoryJd65783","twitter_misc":{"Szacowany czas czytania":"12 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jdaadvisory.com\/nis-2-implementation-directive\/","url":"https:\/\/jdaadvisory.com\/nis-2-implementation-directive\/","name":"NIS-2 Implementation Directive - JDA Advisory","isPartOf":{"@id":"https:\/\/jdaadvisory.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jdaadvisory.com\/nis-2-implementation-directive\/#primaryimage"},"image":{"@id":"https:\/\/jdaadvisory.com\/nis-2-implementation-directive\/#primaryimage"},"thumbnailUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8c5ef6720a3a011fcde29ddedecedf32ca349211.jpg","datePublished":"2026-04-12T19:50:24+00:00","dateModified":"2026-04-16T15:19:30+00:00","description":"NIS-2 Implementation Directive. Implementation requirements analysis, gap assessment, policies, incidents, BCP\/DRP, vendors, and governance.","breadcrumb":{"@id":"https:\/\/jdaadvisory.com\/nis-2-implementation-directive\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jdaadvisory.com\/nis-2-implementation-directive\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/jdaadvisory.com\/nis-2-implementation-directive\/#primaryimage","url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8c5ef6720a3a011fcde29ddedecedf32ca349211.jpg","contentUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8c5ef6720a3a011fcde29ddedecedf32ca349211.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/jdaadvisory.com\/nis-2-implementation-directive\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/jdaadvisory.com\/"},{"@type":"ListItem","position":2,"name":"NIS-2 Implementation Directive"}]},{"@type":"WebSite","@id":"https:\/\/jdaadvisory.com\/en\/#website","url":"https:\/\/jdaadvisory.com\/en\/","name":"JDA Advisory","description":"","publisher":{"@id":"https:\/\/jdaadvisory.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jdaadvisory.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/jdaadvisory.com\/en\/#organization","name":"JDA Advisory","url":"https:\/\/jdaadvisory.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/jdaadvisory.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg","contentUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg","width":1024,"height":1024,"caption":"JDA Advisory"},"image":{"@id":"https:\/\/jdaadvisory.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/AdvisoryJd65783"]}]}},"_links":{"self":[{"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/pages\/409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/comments?post=409"}],"version-history":[{"count":5,"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/pages\/409\/revisions"}],"predecessor-version":[{"id":596,"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/pages\/409\/revisions\/596"}],"wp:attachment":[{"href":"https:\/\/jdaadvisory.com\/pl\/wp-json\/wp\/v2\/media?parent=409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}